About Course
This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It's popularity also brings a larger attack surface and thus it is important to understand it's security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.
What do you Learn?
Fundamentals of Docker Images and Containers
How to build your first docker image
How to run your first docker container
Fundamentals of Container Security
Auditing docker containers using automated tools
Docker security fundamentals for Penetration Testers
Common container misconfigurations
Container security concepts that can be applied in DevSecOps pipelines
Prerequiste
- This course starts from very basics and thus no Docker experience is required
Who is this course for?
IT Professionals using Docker containers
IT Professionals planning to use Docker containers
IT Professionals using any orchestration tool such as Docker Swarm, Kubernetes
Security Enthusiasts
Anyone who is interested in understanding Docker Security
Example Curriculum
- Introduction (0:35)
- What is Docker? (2:03)
- Virtual Machines vs Containers (2:10)
- Virtual Machine Download
- Lab setup (1:19)
- Building your first Docker image (3:58)
- Running your first Docker container (5:21)
- Images vs Containers (2:25)
- How Docker Images are stored locally (15:10)
- Control Groups (5:28)
- Namespaces - Part 1 (5:16)
- Namespaces - Part 2 (6:26)
- Introduction
- Docker Attack Surface (2:38)
- Exploiting vulnerable images (5:15)
- Backdooring Docker Images (7:30)
- Privilege Escalation (6:10)
- Container breakout- Introduction (0:39)
- Introduction to docker.sock (1:39)
- Container escape using docker.sock (5:31)
- Introduction to --privileged flag (4:12)
- Writing to kernel space from a container (5:25)
- Writing to kernel space to get a reverse shell (4:19)
- Accessing Docker Secrets (4:05)